Results 41 to 50 of about 3,708 (115)

A Lightweight and Secure Anonymity Preserving Protocol for WBAN

open access: yesIEEE Access, 2020
In the medical fields, wearable body area sensors network (WBAN) is playing a major role in maintaining user health by providing convenience service for the patient and doctors.
Abdullah M. Almuhaideb   +1 more
doaj   +1 more source

Analisis Protokol CryptO-0N2 dengan Menggunakan Scyther Tool

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2019
Pemilihan Umum (pemilu) di Indonesia merupakan peristiwa yang sangat penting mengingat Indonesia merupakan negara yang menganut paham demokrasi. Metode yang digunakan dalam pemilihan umum di Indonesia adalah dengan menggunakan kertas suara yang ditandai
Esti Rahmawati Agustina   +2 more
doaj   +1 more source

A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System

open access: yesInternational Journal of Distributed Sensor Networks, 2016
Software Defined Network (SDN) architecture has been widely used in various application domains. Aiming at the authentication and security issues of SDN architecture in autonomous decentralized system (ADS) applications, securing the mutual trust among ...
Ruikang Zhou   +5 more
doaj   +1 more source

Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment

open access: yesIEEE Access, 2017
Three-factor mutually authenticated key agreement protocols for multi-server environments have gained momentum in recent times due to advancements in wireless technologies and associated constraints.
Alavalapati Goutham Reddy   +4 more
doaj   +1 more source

2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment

open access: yesIEEE Access, 2018
With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.
Kisung Park   +3 more
doaj   +1 more source

Remotely Access “My” Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme

open access: yesIEEE Access, 2019
Smart home is one of the key applications of the Internet of Things (IoT), which allows users to control the smart devices in their houses through the Internet.
Qiuyun Lyu   +5 more
doaj   +1 more source

Fluoride failure: From Sandy City's water system incident to statewide ban and beyond

open access: yesCase Studies in Chemical and Environmental Engineering
In 2019, a fluoride overfeed in the drinking water system of Sandy City, Utah, USA, sickened residents, corroded pipes, and released lead and copper. Sandy operators changed practices immediately, state water regulators issued administrative orders in ...
Robert B. Sowby
doaj   +1 more source

Giao lưu văn hóa Việt Nam – Nhật Bản giai đoạn 2001-2023: thực trạng và triển vọng

open access: yesTạp chí Khoa học và Công nghệ
Trong bối cảnh toàn cầu hóa, hội nhập quốc tế là xu hướng tất yếu, Việt Nam và Nhật Bản đều nhận thức được tầm quan trọng của việc giao lưu văn hóa. Chính vì thế, hai bên không ngừng thúc đẩy quá trình giao lưu, hợp tác phát triển văn hóa, tạo điều kiện ...
Nguyễn Võ Huyền Dung   +1 more
doaj  

Home - About - Disclaimer - Privacy